Week 7: Key principles that are use to secure TCP/IP.
Fundamentally, TC/IP are not meant to be secure. This protocol does a lot, but it is not secure. Fortunately, there is room to implement to secure the protocol. Here are the five principles that are used to secure TC/IP: encryption, integrity, nonrepudiation, authentication, and authorization.
·
Encryption is the process of scrambling
the data in which if it gets intercepted, they wouldn’t be able to read the
data.
·
Integrity is the process of making sure the
same data is received as originally sent.
·
Nonrepudiation is the process of holding
people accountable in case they change the data through taking a log or other
source for verification.
·
Authentication is the processing of verifying
the identity of a person that is accessing the data and to verify to make sure
the person is who they say they are.
·
Authorization is what an authenticated
person has access to when it comes to the data.
Although not all layers of TCP/IP have the level of security, some layers uses one of this principle to make the protocol secure.